This paper introduces one time password technology, electronic token technology, biometric technology and hardware recognition technology.
文章介绍了一次性口令技术、电子令牌技术、生物识别技术和硬件识别技术。
2
This protocol is based on current hardware foundation of Ethernet and solves access conflict through token-control by creating virtual token on application layer.